iOS开发-获取设备号,钥匙串keychain 记录获取

在之前开发游戏官方渠道sdk的时候,通常会有快速登录的需求,这时候就需要获取设备的唯一标识  来当做用户的账号。

在一些大公司,比如网易、腾讯、游久等,他们都会有自己的一套获取设备号的方法。


之前试过一些,比如mac地址,uuid ,udid等,这些方式也都被苹果禁用了。

当时,uuid可以获取到,但是如果用户在设置中   

设置-隐私-广告-跟踪广告,这个如果是打开状态的话,会造成获取不到设备号(每次设备号都会重新生成)。所以,游戏玩家进入游戏,下线再次登录之后,会发现之前的游戏角色不见了。(或者变成别人的账号,发生串号问题)


那么,我们就要获取一个永不会变的“标识符”,存在设备的钥匙串中,即使删除应用程序(游戏),这个“标识符”依然存在。


如下:项目中实际的解决方案。

+ (NSString*)UDID

{

NSString *udid = [SvUDIDTools getUDIDFromKeyChain];

if(!udid) {

NSString *sysVersion = [UIDevice currentDevice].systemVersion;

CGFloat version = [sysVersion floatValue];

if(version >=7.0) {

udid = [SvUDIDTools _UDID_iOS7];

}

elseif(version >=2.0) {

udid = [SvUDIDTools _UDID_iOS6];

}

[SvUDIDTools settUDIDToKeyChain:udid];

}

returnudid;

}

/*

* iOS 6.0

* use wifi's mac address

*/

+ (NSString*)_UDID_iOS6

{

return[SvUDIDTools getMacAddress];

}

/*

* iOS 7.0

* Starting from iOS 7, the system always returns the value 02:00:00:00:00:00

* when you ask for the MAC address on any device.

* use identifierForVendor + keyChain

* make sure UDID consistency atfer app delete and reinstall

*/

+ (NSString*)_UDID_iOS7

{

return[[UIDevice currentDevice].identifierForVendor UUIDString];

}

#pragma mark -

#pragma mark Helper Method for Get Mac Address

// fromhttp://stackoverflow.com/questions/677530/how-can-i-programmatically-get-the-mac-address-of-an-iphone

+ (NSString *)getMacAddress

{

intmgmtInfoBase[6];

char*msgBuffer =NULL;

size_tlength;

unsignedcharmacAddress[6];

structif_msghdr*interfaceMsgStruct;

structsockaddr_dl*socketStruct;

NSString*errorFlag =nil;

// Setup the management Information Base (mib)

mgmtInfoBase[0] = CTL_NET;// Request network subsystem

mgmtInfoBase[1] = AF_ROUTE;// Routing table info

mgmtInfoBase[2] =0;

mgmtInfoBase[3] = AF_LINK;// Request link layer information

mgmtInfoBase[4] = NET_RT_IFLIST;// Request all configured interfaces

// With all configured interfaces requested, get handle index

if((mgmtInfoBase[5] = if_nametoindex("en0")) ==0)

errorFlag =@"if_nametoindex failure";

else

{

// Get the size of the data available (store in len)

if(sysctl(mgmtInfoBase,6,NULL, &length,NULL,0) <0)

errorFlag =@"sysctl mgmtInfoBase failure";

else

{

// Alloc memory based on above call

if((msgBuffer = malloc(length)) ==NULL)

errorFlag =@"buffer allocation failure";

else

{

// Get system information, store in buffer

if(sysctl(mgmtInfoBase,6, msgBuffer, &length,NULL,0) <0)

errorFlag =@"sysctl msgBuffer failure";

}

}

}

// Befor going any further...

if(errorFlag !=NULL)

{

NSLog(@"Error: %@", errorFlag);

if(msgBuffer) {

free(msgBuffer);

}

returnerrorFlag;

}

// Map msgbuffer to interface message structure

interfaceMsgStruct = (structif_msghdr *) msgBuffer;

// Map to link-level socket structure

socketStruct = (structsockaddr_dl *) (interfaceMsgStruct +1);

// Copy link layer address data in socket structure to an array

memcpy(&macAddress, socketStruct->sdl_data + socketStruct->sdl_nlen,6);

// Read from char array into a string object, into traditional Mac address format

NSString *macAddressString = [NSString stringWithFormat:@"%02X:%02X:%02X:%02X:%02X:%02X",

macAddress[0], macAddress[1], macAddress[2],

macAddress[3], macAddress[4], macAddress[5]];

NSLog(@"Mac Address: %@", macAddressString);

// Release the buffer memory

free(msgBuffer);

returnmacAddressString;

}

#pragma mark -

#pragma mark Helper Method for make identityForVendor consistency

+ (NSString*)getUDIDFromKeyChain

{

NSMutableDictionary *dictForQuery = [[NSMutableDictionary alloc] init];

[dictForQuery setValue:(id)kSecClassGenericPassword forKey:(id)kSecClass];

// set Attr Description for query

[dictForQuery setValue:[NSString stringWithUTF8String:kKeychainUDIDItemIdentifier]

forKey:kSecAttrDescription];

// set Attr Identity for query

NSData *keychainItemID = [NSData dataWithBytes:kKeychainUDIDItemIdentifier

length:strlen(kKeychainUDIDItemIdentifier)];

[dictForQuery setObject:keychainItemID forKey:(id)kSecAttrGeneric];

// The keychain access group attribute determines if this item can be shared

// amongst multiple apps whose code signing entitlements contain the same keychain access group.

NSString *accessGroup = [NSString stringWithUTF8String:kKeyChainUDIDAccessGroup];

if(accessGroup !=nil)

{

#if TARGET_IPHONE_SIMULATOR

// Ignore the access group if running on the iPhone simulator.

//

// Apps that are built for the simulator aren't signed, so there's no keychain access group

// for the simulator to check. This means that all apps can see all keychain items when run

// on the simulator.

//

// If a SecItem contains an access group attribute, SecItemAdd and SecItemUpdate on the

// simulator will return -25243 (errSecNoAccessForItem).

#else

[dictForQuery setObject:accessGroup forKey:(id)kSecAttrAccessGroup];

#endif

}

[dictForQuery setValue:(id)kCFBooleanTrue forKey:(id)kSecMatchCaseInsensitive];

[dictForQuery setValue:(id)kSecMatchLimitOne forKey:(id)kSecMatchLimit];

[dictForQuery setValue:(id)kCFBooleanTrue forKey:(id)kSecReturnData];

OSStatus queryErr= noErr;

NSData*udidValue =nil;

NSString *udid=nil;

queryErr = SecItemCopyMatching((CFDictionaryRef)dictForQuery, (CFTypeRef*)&udidValue);

NSMutableDictionary *dict =nil;

[dictForQuery setValue:(id)kCFBooleanTrue forKey:(id)kSecReturnAttributes];

queryErr = SecItemCopyMatching((CFDictionaryRef)dictForQuery, (CFTypeRef*)&dict);

if(queryErr == errSecItemNotFound) {

NSLog(@"KeyChain Item: %@ not found!!!", [NSString stringWithUTF8String:kKeychainUDIDItemIdentifier]);

}

elseif(queryErr != errSecSuccess) {

NSLog(@"KeyChain Item query Error!!! Error code:%ld", queryErr);

}

if(queryErr == errSecSuccess) {

NSLog(@"KeyChain Item: %@", udidValue);

if(udidValue) {

udid = [NSString stringWithUTF8String:udidValue.bytes];

[udidValue release];

}

[dict release];

}

[dictForQuery release];

returnudid;

}

+ (BOOL)settUDIDToKeyChain:(NSString*)udid

{

NSMutableDictionary *dictForAdd = [[NSMutableDictionary alloc] init];

[dictForAdd setValue:(id)kSecClassGenericPassword forKey:(id)kSecClass];

[dictForAdd setValue:[NSString stringWithUTF8String:kKeychainUDIDItemIdentifier] forKey:kSecAttrDescription];

[dictForAdd setValue:@"UUID"forKey:(id)kSecAttrGeneric];

// Default attributes for keychain item.

[dictForAdd setObject:@""forKey:(id)kSecAttrAccount];

[dictForAdd setObject:@""forKey:(id)kSecAttrLabel];

// The keychain access group attribute determines if this item can be shared

// amongst multiple apps whose code signing entitlements contain the same keychain access group.

NSString *accessGroup = [NSString stringWithUTF8String:kKeyChainUDIDAccessGroup];

if(accessGroup !=nil)

{

#if TARGET_IPHONE_SIMULATOR

// Ignore the access group if running on the iPhone simulator.

//

// Apps that are built for the simulator aren't signed, so there's no keychain access group

// for the simulator to check. This means that all apps can see all keychain items when run

// on the simulator.

//

// If a SecItem contains an access group attribute, SecItemAdd and SecItemUpdate on the

// simulator will return -25243 (errSecNoAccessForItem).

#else

[dictForAdd setObject:accessGroup forKey:(id)kSecAttrAccessGroup];

#endif

}

constchar*udidStr = [udid UTF8String];

NSData *keyChainItemValue = [NSData dataWithBytes:udidStr length:strlen(udidStr)];

[dictForAdd setValue:keyChainItemValue forKey:(id)kSecValueData];

OSStatus writeErr = noErr;

if([SvUDIDTools getUDIDFromKeyChain]) {// there is item in keychain

[SvUDIDTools updateUDIDInKeyChain:udid];

[dictForAdd release];

returnYES;

}

else{// add item to keychain

writeErr = SecItemAdd((CFDictionaryRef)dictForAdd,NULL);

if(writeErr != errSecSuccess) {

NSLog(@"Add KeyChain Item Error!!! Error Code:%ld", writeErr);

[dictForAdd release];

returnNO;

}

else{

NSLog(@"Add KeyChain Item Success!!!");

[dictForAdd release];

returnYES;

}

}

[dictForAdd release];

returnNO;

}

+ (BOOL)removeUDIDFromKeyChain

{

NSMutableDictionary *dictToDelete = [[NSMutableDictionary alloc] init];

[dictToDelete setValue:(id)kSecClassGenericPassword forKey:(id)kSecClass];

NSData *keyChainItemID = [NSData dataWithBytes:kKeychainUDIDItemIdentifier length:strlen(kKeychainUDIDItemIdentifier)];

[dictToDelete setValue:keyChainItemID forKey:(id)kSecAttrGeneric];

OSStatus deleteErr = noErr;

deleteErr = SecItemDelete((CFDictionaryRef)dictToDelete);

if(deleteErr != errSecSuccess) {

NSLog(@"delete UUID from KeyChain Error!!! Error code:%ld", deleteErr);

[dictToDelete release];

returnNO;

}

else{

NSLog(@"delete success!!!");

}

[dictToDelete release];

returnYES;

}

+ (BOOL)updateUDIDInKeyChain:(NSString*)newUDID

{

NSMutableDictionary *dictForQuery = [[NSMutableDictionary alloc] init];

[dictForQuery setValue:(id)kSecClassGenericPassword forKey:(id)kSecClass];

NSData *keychainItemID = [NSData dataWithBytes:kKeychainUDIDItemIdentifier

length:strlen(kKeychainUDIDItemIdentifier)];

[dictForQuery setValue:keychainItemID forKey:(id)kSecAttrGeneric];

[dictForQuery setValue:(id)kCFBooleanTrue forKey:(id)kSecMatchCaseInsensitive];

[dictForQuery setValue:(id)kSecMatchLimitOne forKey:(id)kSecMatchLimit];

[dictForQuery setValue:(id)kCFBooleanTrue forKey:(id)kSecReturnAttributes];

NSDictionary *queryResult =nil;

SecItemCopyMatching((CFDictionaryRef)dictForQuery, (CFTypeRef*)&queryResult);

if(queryResult) {

NSMutableDictionary *dictForUpdate = [[NSMutableDictionary alloc] init];

[dictForUpdate setValue:[NSString stringWithUTF8String:kKeychainUDIDItemIdentifier] forKey:kSecAttrDescription];

[dictForUpdate setValue:keychainItemID forKey:(id)kSecAttrGeneric];

constchar*udidStr = [newUDID UTF8String];

NSData *keyChainItemValue = [NSData dataWithBytes:udidStr length:strlen(udidStr)];

[dictForUpdate setValue:keyChainItemValue forKey:(id)kSecValueData];

OSStatus updateErr = noErr;

// First we need the attributes from the Keychain.

NSMutableDictionary *updateItem = [NSMutableDictionary dictionaryWithDictionary:queryResult];

[queryResult release];

// Second we need to add the appropriate search key/values.

// set kSecClass is Very important

[updateItem setObject:(id)kSecClassGenericPassword forKey:(id)kSecClass];

updateErr = SecItemUpdate((CFDictionaryRef)updateItem, (CFDictionaryRef)dictForUpdate);

if(updateErr != errSecSuccess) {

NSLog(@"Update KeyChain Item Error!!! Error Code:%ld", updateErr);

[dictForQuery release];

[dictForUpdate release];

returnNO;

}

else{

NSLog(@"Update KeyChain Item Success!!!");

[dictForQuery release];

[dictForUpdate release];

returnYES;

}

}

[dictForQuery release];

returnNO;

}

最后编辑于
©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 159,716评论 4 364
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 67,558评论 1 294
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 109,431评论 0 244
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 44,127评论 0 209
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 52,511评论 3 287
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 40,692评论 1 222
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 31,915评论 2 313
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 30,664评论 0 202
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 34,412评论 1 246
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 30,616评论 2 245
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 32,105评论 1 260
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 28,424评论 2 254
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 33,098评论 3 238
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 26,096评论 0 8
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 26,869评论 0 197
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 35,748评论 2 276
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 35,641评论 2 271

推荐阅读更多精彩内容